Content: <br>Acknowledgements</span></a></h3>, <i>Page v</i><br>Lead author/technical editor</span></a></h3>, <i>Page vii</i><br>Contributing authors</span></a></h3>, <i>Pages vii-ix</i><br>Technical reviewer</span></a></h3>, <i>Page ix</i><br>Foreword</span></a></h3>, <i>Pages xix-xx</i><br>Chapter
Intrusion Prevention and Active Response
โ Scribed by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin
- Publisher
- Syngress
- Year
- 2005
- Tongue
- English
- Leaves
- 425
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
โฆ Table of Contents
Intrusion Prevention and Active Response_ Deploying Network andP1.pdf......Page 1
Intrusion Prevention and Active Response_ Deploying Network andP2.pdf......Page 101
Intrusion Prevention and Active Response_ Deploying Network andP3.pdf......Page 209
๐ SIMILAR VOLUMES
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se
<span>Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Inter
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se